The Berachain validators have coordinated to purposefully halt the Berachain network as the core team performs an emergency hard fork to address Balancer V2 related exploits on the BEX.
All balancer forked protocols infected.
Balancer exploitation was so sophisticated.
@EthSecurity1
All balancer forked protocols infected.
Balancer exploitation was so sophisticated.
@EthSecurity1
🙉10😨1
A letter from sonic community to balancer hacker :
Sonic foundation could freez coins of certain wallet
@EthSecurity1
We know you are selling $stS to $S, but there is no way out from Sonic chain.
You won't be swapping for USDC (will get frozen instantly), USDT is liquidity is too thin along with S/ETH & S/BTC (non -existent)
So bridging is just not possible, unless u willing to take 60 to 70% haircut by swapping $3.6M S to ETH or BTC.
And guess what!
SonicLabs has wiped out all $S / wS holding of the hacker.
Sonic foundation could freez coins of certain wallet
@EthSecurity1
😁13🤔2
Here is three reports that close to what happend to balancer V2
Certora: Balancer Exploit Explained: What Went Wrong and Why v3 Is Safe - link
Coinspect Security: Balancer V2 Stable Pools Exploit — Rate Manipulation - link
Blocksec: Balancer V2 Report - link
@EthSecurity1
Certora: Balancer Exploit Explained: What Went Wrong and Why v3 Is Safe - link
Coinspect Security: Balancer V2 Stable Pools Exploit — Rate Manipulation - link
Blocksec: Balancer V2 Report - link
@EthSecurity1
Certora
Balancer Exploit Explained: What Went Wrong and Why v3 Is Safe
Certora’s in-depth analysis of the Balancer v2 exploit — what caused it, and how v3’s redesign prevents similar hacks.
🔥9👍1
Secure dApps Against UI Spoofing __ part 1 Decoding Transactions, part 2 Simulating Transactions
RACE #40 Of The Secureum Bootcamp Epoch∞ write up
@EthSecurity1
RACE #40 Of The Secureum Bootcamp Epoch∞ write up
@EthSecurity1
www.cyfrin.io
Decoding Ethereum Transactions to Prevent UI Spoofing
Learn how to decode Ethereum calldata using Python to detect and prevent UI spoofing attacks before signing malicious dApp transactions.
🔥5❤2
EthSecurity
A letter from sonic community to balancer hacker : We know you are selling $stS to $S, but there is no way out from Sonic chain. You won't be swapping for USDC (will get frozen instantly), USDT is liquidity is too thin along with S/ETH & S/BTC (non -existent)…
Seems balancer hacker 's wallet was initially frozen stS, bypassed prohibition and swap to wBTC,ETH
Permit transaction: 0xe3eab35b288c086afa9b86a97ab93c7bb61d21b1951a156d2a8f6f5d5715c475
@EthSecurity1
Permit transaction: 0xe3eab35b288c086afa9b86a97ab93c7bb61d21b1951a156d2a8f6f5d5715c475
@EthSecurity1
😁12👏3🤯1
Balancer announced that it successfully executed a rescue of ~$4.1M following a new exploit path. detailed information has not yet been disclosed
@EthSecurity1
@EthSecurity1
🙉7😁1
The Crypto OpSec Bible - link
The cryptography behind passkeys - link
Understanding and Characterizing Obfuscated Funds Transfers in Ethereum Smart Contracts - link
@EthSecurity1
The cryptography behind passkeys - link
Understanding and Characterizing Obfuscated Funds Transfers in Ethereum Smart Contracts - link
@EthSecurity1
X (formerly Twitter)
Omar (mainnet arc) (@acceleratooooor) on X
The Crypto OpSec Bible
🔥6
The TEE security handbook is live now.
This document covers:
+ Defining TEEs
+ TEE attacks categorisation
+ Deep dive of TEE platforms
+ Threat modelling around TEEs
+ Security layers for TEE protocols
+ Best practices for engineers & protocols
https://docs.bluethroatlabs.com
@EthSecurity1
This document covers:
+ Defining TEEs
+ TEE attacks categorisation
+ Deep dive of TEE platforms
+ Threat modelling around TEEs
+ Security layers for TEE protocols
+ Best practices for engineers & protocols
https://docs.bluethroatlabs.com
@EthSecurity1
Bluethroatlabs
Executive Summary | TEE Security Handbook
<PageBanner
🔥9❤3
How Aztec works - link
math bugs drain millions from Defi protocols - link
Hackers found a new way to phish — through browser notifications.
A new tool called Matrix Push C2 lets attackers send fake alerts that look like real ones from PayPal, Netflix, or TikTok.- Link
@EthSecurity1
math bugs drain millions from Defi protocols - link
Hackers found a new way to phish — through browser notifications.
A new tool called Matrix Push C2 lets attackers send fake alerts that look like real ones from PayPal, Netflix, or TikTok.- Link
@EthSecurity1
X (formerly Twitter)
alex.korn (@0xAlexKorn) on X
How Aztec Works
🔥6
nexa_network’s cross-chain token solution CATERC20 vulnerable to when switching owner it return zero. hacker used it to exploit port3 network. loss ~$160K
@EthSecurity1
@EthSecurity1
👍6❤2
Full list of packages that were affected by the latest npm attack :
ens packages
ethereum-ens
crypto-addr-codec
uniswap-router-sdk
valuedex-sdk
coinmarketcap-api
luno-api
soneium-acs
evm-checkcode-cli
gate-evm-check-code2
gate-evm-tools-test
create-hardhat3-app
test-hardhat-app
test-foundry-app
@accordproject/concerto-analysis
@accordproject/concerto-linter
@accordproject/concerto-linter-default-ruleset
@accordproject/concerto-metamodel
@accordproject/markdown-it-cicero
@accordproject/template-engine
@ifelsedeveloper/protocol-contracts-svm-idl
@EthSecurity1
ens packages
ethereum-ens
crypto-addr-codec
uniswap-router-sdk
valuedex-sdk
coinmarketcap-api
luno-api
soneium-acs
evm-checkcode-cli
gate-evm-check-code2
gate-evm-tools-test
create-hardhat3-app
test-hardhat-app
test-foundry-app
@accordproject/concerto-analysis
@accordproject/concerto-linter
@accordproject/concerto-linter-default-ruleset
@accordproject/concerto-metamodel
@accordproject/markdown-it-cicero
@accordproject/template-engine
@ifelsedeveloper/protocol-contracts-svm-idl
@EthSecurity1
👍4🔥4❤1
All four signatures were off-chain signatures, but the safe
backend exposes them to anyone, as opposed to only other signers. This is a design decision: you don't have to auth the owners, but comes with a tradeoff. link
HINT: use localsafe.eth
@EthSecurity1
backend exposes them to anyone, as opposed to only other signers. This is a design decision: you don't have to auth the owners, but comes with a tradeoff. link
HINT: use localsafe.eth
@EthSecurity1
🙉8❤1👍1🔥1
Revela Move decompiler - link
World's first CPU-level ransomware can "bypass every freaking traditional technology - link
Bitcoin stealer malware found in official printer drivers already stole more than 9 BTC - link
Bountyhunt3rz youtube interviews the top bug bounty hunters in crypto - link
@EthSecurity1
World's first CPU-level ransomware can "bypass every freaking traditional technology - link
Bitcoin stealer malware found in official printer drivers already stole more than 9 BTC - link
Bountyhunt3rz youtube interviews the top bug bounty hunters in crypto - link
@EthSecurity1
revela.verichains.io
Revela Decompiler
Decompile Aptos and Sui smart contracts to recover Move source code.
🔥5❤1
🤔2